Secrecy Offloading Rate Maximization for Multi-Access Mobile Edge Computing Networks
نویسندگان
چکیده
This letter considers a multi-access mobile edge computing (MEC) network consisting of multiple users, base stations, and malicious eavesdropper. Specifically, the users adopt partial offloading strategy by partitioning computation task into several parts. One is executed locally others are securely offloaded to MEC servers integrated stations leveraging physical layer security combat eavesdropping. We jointly optimize power allocation, partition, subcarrier resource maximize secrecy rate subject communication constraints. Numerical results demonstrate that our proposed schemes outperform benchmark substantially emphasize necessity conducting over servers.
منابع مشابه
Computation Rate Maximization for Wireless Powered Mobile-Edge Computing with Binary Computation Offloading
Finite battery lifetime and low computing capability of size-constrained wireless devices (WDs) have been longstanding performance limitations of many low-power wireless networks, e.g., wireless sensor networks (WSNs) and Internet of Things (IoT). The recent development of radio frequency (RF) based wireless power transfer (WPT) and mobile edge computing (MEC) technologies provide promising sol...
متن کاملJoint Task Offloading and Resource Allocation for Multi-Server Mobile-Edge Computing Networks
Mobile-Edge Computing (MEC) is an emerging paradigm that provides a capillary distribution of cloud computing capabilities to the edge of the wireless access network, enabling rich services and applications in close proximity to the end users. In this article, a MEC enabled multi-cell wireless network is considered where each Base Station (BS) is equipped with a MEC server that can assist mobil...
متن کاملAn ADMM Based Method for Computation Rate Maximization in Wireless Powered Mobile-Edge Computing Networks
In this paper, we consider a wireless powered mobile edge computing (MEC) network, where the distributed energyharvesting wireless devices (WDs) are powered by means of radio frequency (RF) wireless power transfer (WPT). In particular, the WDs follow a binary computation offloading policy, i.e., data set of a computing task has to be executed as a whole either locally or remotely at the MEC ser...
متن کاملReliable Distributed Authentication in Multi-Access Mobile Edge Computing
The fifth generation (5G) mobile telecommunication network is expected to support multi-access mobile edge computing (MEC), which intends to distribute computation tasks and services from the central cloud to the edge clouds. Towards ultraresponsive, ultra-reliable and ultra-low-latency MEC services, the current mobile network security architecture should enable more decentralized approach for ...
متن کاملJoint Service Caching and Task Offloading for Mobile Edge Computing in Dense Networks
Mobile Edge Computing (MEC) pushes computing functionalities away from the centralized cloud to the network edge, thereby meeting the latency requirements of many emerging mobile applications and saving backhaul network bandwidth. Although many existing works have studied computation offloading policies, service caching is an equally, if not more important, design topic of MEC, yet receives muc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Communications Letters
سال: 2021
ISSN: ['1558-2558', '1089-7798', '2373-7891']
DOI: https://doi.org/10.1109/lcomm.2021.3114772